{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:47:51Z","timestamp":1767340071454},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030016883"},{"type":"electronic","value":"9783030016890"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01689-0_22","type":"book-chapter","created":{"date-parts":[[2018,9,22]],"date-time":"2018-09-22T07:22:22Z","timestamp":1537600942000},"page":"281-290","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Enhancing Information Security Culture to Reduce Information Security Cost: A Proposed Framework"],"prefix":"10.1007","author":[{"given":"S. G.","family":"Govender","sequence":"first","affiliation":[]},{"given":"M.","family":"Loock","sequence":"additional","affiliation":[]},{"given":"E.","family":"Kritzinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,23]]},"reference":[{"issue":"2","key":"22_CR1","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1042091.1042094","volume":"48","author":"LD Bodin","year":"2005","unstructured":"Bodin, L.D., Gordon, L.A., Loeb, M.P.: Evaluating information security investments using the analytic hierarchy process. Commun. ACM 48(2), 78\u201383 (2005)","journal-title":"Commun. ACM"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"1031","DOI":"10.1016\/j.ipm.2012.01.001","volume":"48","author":"R Bojanc","year":"2012","unstructured":"Bojanc, R., Jerman-Blazic, B., Tekavcic, M.: Managing the investment in information security technology by the use of a quantitative model. Inf. Process. Manag. 48, 1031\u20131052 (2012)","journal-title":"Inf. Process. Manag."},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Casillo, M., Colace, F., Pascale, F., Lemma, S. and Lombardi, M.: A tailor made system for providing personalized services. In: Proceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKE 2017, pp. 495\u2013500 (2017)","DOI":"10.18293\/SEKE2017-151"},{"issue":"4","key":"22_CR4","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.im.2014.12.004","volume":"52","author":"H Cavasoglu","year":"2015","unstructured":"Cavasoglu, H., Cavasoglu, H., Son, J., Benbasat, I.: Institutional pressures in security management: direct and indirect influences on organizational investment in information security control resources. Inf. Manag. 52(4), 385\u2013400 (2015)","journal-title":"Inf. Manag."},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Colace, F., et al.: A context-aware framework for cultural heritage applications. In: Proceedings 10th International Conference on Signal-Image Technology and Internet-Based Systems, SITIS 2014, p. 469 (2014)","DOI":"10.1109\/SITIS.2014.14"},{"issue":"February","key":"22_CR6","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.cose.2012.09.010","volume":"32","author":"RE Crossler","year":"2013","unstructured":"Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M., Baskerville, R.: Future directions for behavioral information security research. Comput. Secur. 32(February), 90\u2013101 (2013)","journal-title":"Comput. Secur."},{"issue":"10","key":"22_CR7","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1145\/1290958.1290971","volume":"50","author":"J D\u2019Arcy","year":"2007","unstructured":"D\u2019Arcy, J., Hovav, A.: Deterring internal information systems misuse. Commun. ACM 50(10), 113\u2013117 (2007)","journal-title":"Commun. ACM"},{"key":"22_CR8","unstructured":"Drake, P. Clarke, S.: Social aspects of information security. IGI Global (2009)"},{"issue":"8","key":"22_CR9","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1016\/S0167-4048(00)08019-6","volume":"19","author":"MM Eloff","year":"2000","unstructured":"Eloff, M.M., Von Solms, S.H.: Information security management: an approach to combine process certification and product evaluation. Comput. Secur. 19(8), 698\u2013709 (2000)","journal-title":"Comput. Secur."},{"key":"22_CR10","unstructured":"Furnham, A., Gunter, B.: Corporate culture: diagnosis and change. In: Cooper, C.L., Robertson, I.T., International Review of Industrial and Organizational Psychology, Wiley, Chichester (2003)"},{"key":"22_CR11","unstructured":"Garret, C.: Developing a security awareness culture -improving security decision making. In: SANS Institute InfoSec Reading Room (2004)"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Gunter, S.: Digitally secure transformation. IT Now, June 2017, pp 12\u201313 (2017)","DOI":"10.1093\/itnow\/bwx036"},{"key":"22_CR13","unstructured":"Hampden-Turner, C., Trompenaars, F.: The seven cultures of capitalism, Piatkus (1994)"},{"issue":"2","key":"22_CR14","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1287\/isre.2015.0569","volume":"26","author":"J Hsu","year":"2015","unstructured":"Hsu, J., Shih, S.-P., Hung, Y.W., Lowry, P.B.: How extra-role behaviors can improve information security policy effectiveness. Inf. Syst. Res. 26(2), 282\u2013300 (2015)","journal-title":"Inf. Syst. Res."},{"key":"22_CR15","unstructured":"Kaspersky lab: damage control: the cost of security breaches, IT security risks special report series (2016)"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Lowry, P.B., Moody, G.D.: Proposing the control? Reactance Compliance Model (CRCM) to explain opposing motivations to comply with organizational information security policies (2015)","DOI":"10.1111\/isj.12043"},{"issue":"3","key":"22_CR17","first-page":"52","volume":"12","author":"J Martin","year":"1983","unstructured":"Martin, J., Siehl, C.: Organizational culture and counterculture: an uneasy symbioses. Am. Manag. Assoc. 12(3), 52\u201364 (1983)","journal-title":"Am. Manag. Assoc."},{"issue":"6","key":"22_CR18","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/777313.777327","volume":"46","author":"RT Mecuri","year":"2003","unstructured":"Mecuri, R.T.: Analyzing Security Costs. Commun. ACM 46(6), 15\u201318 (2003)","journal-title":"Commun. ACM"},{"key":"22_CR19","volume-title":"The Art of Deception: Controlling the Human Element of Security","author":"KD Mitnick","year":"2002","unstructured":"Mitnick, K.D., Simon, W.L.: The Art of Deception: Controlling the Human Element of Security. Wiley Publishing, Hoboke (2002)"},{"key":"22_CR20","volume-title":"Human Factors and Information Security: Individual","author":"K Parsons","year":"2010","unstructured":"Parsons, K., Mccormac, A., Butavicius, M., Ferguson, L.: Human Factors and Information Security: Individual. Culture and Security Environment. Government Research Paper edn. Australian Government, Department of defence, defence science and technology organization (2010)"},{"key":"22_CR21","unstructured":"Ponemon : Cost of data breach study. Ponemon Institute Research Study (2017)"},{"key":"22_CR22","unstructured":"Rotvold, G.: How To Create Security Culture in Your Organization [Homepage of Information Management]. http:\/\/content.arma.org\/IMM\/NovDec2008\/How_to_Create_a_Security_Culture.aspx [June, 2018]. (2008)"},{"key":"22_CR23","first-page":"56","volume":"26","author":"AB Ruighaver","year":"2007","unstructured":"Ruighaver, A.B., Maynard, S.B., Chang, S.: Organizational security culture: extending the end user perspective. Comput. Soc. 26, 56\u201362 (2007)","journal-title":"Comput. Soc."},{"issue":"5","key":"22_CR24","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1007\/s10796-016-9648-8","volume":"19","author":"D Schatz","year":"2017","unstructured":"Schatz, D., Bashroush, R.: Economic valuation for information security investment: a systematic literature review. Inf. Syst. Front. 19(5), 1205\u20131228 (2017)","journal-title":"Inf. Syst. Front."},{"issue":"2","key":"22_CR25","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/503345.503348","volume":"31","author":"MT Siponen","year":"2001","unstructured":"Siponen, M.T.: Five dimensions of information security awareness. Comput. Soc. 31(2), 24\u201329 (2001)","journal-title":"Comput. Soc."},{"key":"22_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39498-0","volume-title":"The Economics of Information Security and Privacy","author":"T Takemura","year":"2013","unstructured":"Takemura, T., Komatsu, A.: An empirical study on information security behaviors and awareness. In: B\u00f6hme, R. (ed.) The Economics of Information Security and Privacy. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39498-0"},{"issue":"2","key":"22_CR27","doi-asserted-by":"publisher","first-page":"345","DOI":"10.25300\/MISQ\/2015\/39.2.04","volume":"39","author":"A Vance","year":"2015","unstructured":"Vance, A., Lowry, P.B., Eggett, D.: A new approach to the problem of access policy violations: increasing perceptions of accountability through the user interface. MIS Quart. 39(2), 345\u2013366 (2015)","journal-title":"MIS Quart."},{"key":"22_CR28","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.cose.2009.10.005","volume":"29","author":"JF Niekerk Van","year":"2010","unstructured":"Van Niekerk, J.F., Von Solms, R.: Information security culture: a management perspective. Comput. Secur. 29, 476\u2013486 (2010)","journal-title":"Comput. Secur."},{"key":"22_CR29","unstructured":"Verizon: 2017 Data Breach Investigation Report, 10th Edition, accessed from http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/data-breach-digest\/2017\/ (2017)"},{"key":"22_CR30","volume-title":"Strategic Information Security","author":"J Wylder","year":"2004","unstructured":"Wylder, J.: Strategic Information Security. CRC Press, Boca Raton Florida (2004)"}],"container-title":["Lecture Notes in Computer Science","Cyberspace Safety and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01689-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T13:06:19Z","timestamp":1571922379000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01689-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030016883","9783030016890"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01689-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Cyberspace Safety and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amalfi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"css2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/css2018.di.unisa.it\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}